Skip to main content

Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework

  • Conference paper
Networked Digital Technologies (NDT 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 294))

Included in the following conference series:

Abstract

With the emergence of service-oriented economy, distributed systems and cloud computing, thus the development of service oriented architecture and the adoption open standards become a mean to assure interoperability. Privacy could play a key role for digital identity protection and security. We suggest an implementation framework, Privacy-as-a-Set-of-Services (PaaSS) framework, which could help information system’s security team to implement digital identity privacy requirements into a set of services. The framework relays on the idea that digital identity privacy business interoperability should be taken into consideration from the outset of the project in order to be able to provide technical interoperability. Business interoperability is a set of requirements that are drawn from global, domestic and business-specific privacy policies, however, technical interoperability is offered through the adoption of open standards and implementation of a set of services and service’s interfaces that could accommodate SOA. The framework is in accordance of model-driven architecture (MDA) approach and it is composed of five layers and three mapping gateways. Inter- & intra-layers iterations are consequence of SOA delivery lifecycle and strategies alignment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Philippsohn, S.: ID and the Law. In: Birch, D.G.W. (ed.) Digital Identity Management: Perspectives on the Technological, Business and Social Implications, pp. 193–203. Gower Publishing Limited (2007)

    Google Scholar 

  2. Cochrane, P.: Forward of the Book. In: Birch, D.G.W. (ed.) Digital Identity Management: Perspectives on the Technological, Business and Social Implications. Gower Publishing Limited (2007)

    Google Scholar 

  3. Cameron, K.: The Laws of Identity. ed: Microsoft Corporation (2005)

    Google Scholar 

  4. Hansen, M., et al.: Privacy and Identity Management. IEEE Security & Privacy (2008)

    Google Scholar 

  5. Bell, G., Gemmel, J.: A Digital Life. Scientific American Magazine, 58–65 (2007)

    Google Scholar 

  6. International Telecommunication Union. Digital Life. ITU Internet Report (2006), http://www.itu.int/osg/spu/publications/digitalife/docs/digital-life-web.pdf

  7. Windley, P.J.: Digital Identity: Unmasking identity management architecture (IMA). O’Reilly Media (2005)

    Google Scholar 

  8. Cukier, K.: A special report on managing information. The Economist, February 23-March 5 (2010)

    Google Scholar 

  9. Organizing Committee of Digital Identity & Privacy (Human Capital & Social Innovation Technology Summit). Call for Controbution to Managing Digital Identities for Education, Employment and Business Development (2007), http://events.eife-l.org/HCSIT2007/overview/dip/dip2007

  10. Erl, T.: Service-Oriented Architecture: Concepts, Technology, and Design. Prentice Hall (2005)

    Google Scholar 

  11. Noonan, H.: Identity, in Stanford Encyclopedia of Philosophy, ed. (2009)

    Google Scholar 

  12. Organisation for Economic Co-operation and Development. The Role of Digital Identity Management in the Internet Economy: A primer for policy makers (2009), http://www.oecd.org/dataoecd/55/48/43091476.pdf

  13. Benantar, M.: Access Control Systems: Security, Identity Management and Trust Models. Springer Science + Business Media (2006)

    Google Scholar 

  14. Ben Ayed, G., Ghernaouti-Hélie, S.: Privacy Requirements Specification for Digital Identity Management Systems Implementation: Towards a digital society of privacy. In: 6th International Conference for Internet Technology and Secured Transactions (ICITST 2011), Abu Dhabi, UAE (2011)

    Google Scholar 

  15. Center for Democracy & Technology. Privacy Principles for Identity in the Digital Age (Draft for Comment - Version 1.4) (2007), http://www.cdt.org/files/pdfs/20071201_IDPrivacyPrinciples.pdf

  16. Organization for Economic Co-operation and Development (OECD). At Crossroads: Personhood and Digital Identity in the Information Society. The Working Paper series of the OECD Directorate for Science, Technology and Industry (2008), http://www.oecd.org/LongAbstract/0,3425,en_2649_34223_40204774_119684_1_1_1,00.html

  17. Lessig, L.: Code and Other Laws of Cyberspace. Basic Books (2000)

    Google Scholar 

  18. Cavoukian, A.: Privacy by Design (2009), http://www.privacybydesign.ca/pbdbook/PrivacybyDesignBook.pdf

  19. Sandhu, R.: Engineering Authority and Trust in Cyberspace: The OM-AM and RABC Way. In: Proceedings of the 5th ACM Workshop on RBAC, pp. 111–119 (2000)

    Google Scholar 

  20. Schubert, L., et al.: The Future of Cloud Computing: Opportunities for European cloud computing beyond 2010 (2009), http://cordis.europa.eu/fp7/ict/ssai/docs/cloud-report-final.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ayed, G.B., Ghernaouti-Hélie, S. (2012). Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 294. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30567-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30567-2_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30566-5

  • Online ISBN: 978-3-642-30567-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics